Skip to content

v40.25

This permission is allowed when the virt_use_sanlock tunable
is turned on.

The commit addresses the following AVC denials:
type=AVC msg=audit(1718964317.317:19438): avc:  denied  { write } for  pid=180681 comm="daemon-init" name="sanlock.sock" dev="tmpfs" ino=16749 scontext=system_u:system_r:virtqemud_t:s0 tcontext=system_u:object_r:sanlock_var_run_t:s0 tclass=sock_file permissive=1
type=AVC msg=audit(1718964317.317:19438): avc:  denied  { connectto } for  pid=180681 comm="daemon-init" path="/run/sanlock/sanlock.sock" scontext=system_u:system_r:virtqemud_t:s0 tcontext=system_u:system_r:sanlock_t:s0-s0:c0.c1023 tclass=unix_stream_socket permissive=1

Resolves: RHEL-44352
Assets 2
Loading